{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:05:17Z","timestamp":1729627517592,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/icect.2004.1319740","type":"proceedings-article","created":{"date-parts":[[2004,11,12]],"date-time":"2004-11-12T19:14:14Z","timestamp":1100286854000},"page":"244-251","source":"Crossref","is-referenced-by-count":4,"title":["LITESET\/A++: a new agent-assisted secure payment protocol"],"prefix":"10.1109","author":[{"family":"Yan Wang","sequence":"first","affiliation":[]},{"family":"Tieyan Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"422","article-title":"A secure agent-mediated payment protocol","volume":"2512","author":"pang","year":"2002","journal-title":"Fourth International Conference on Information and Communications Security (ICICS2002) Springer-Verlag LNCS"},{"key":"17","first-page":"215","article-title":"LITESET: A lightweight secure electronic transaction protocol","volume":"1438","author":"hanaoka","year":"1998","journal-title":"Proc ACISP'98"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4461-6_4"},{"key":"15","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/BFb0030430","article-title":"Signcryption and its applications in efficient public key solutions","volume":"1397","author":"zheng","year":"1998","journal-title":"Information Security Workshop (ISW'97)"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"journal-title":"Secure Electronic Transaction (SET) Specification Version 1 0","year":"1997","key":"13"},{"key":"14","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/BFb0052234","article-title":"Digital signcryption or how to achieve cost (signature&encrypti?on)?cost (signature)+cost (encryption)","volume":"1294","author":"zheng","year":"1997","journal-title":"Advances in Cryptology-CRYPO'97"},{"key":"11","first-page":"289","article-title":"Secure transactions with mobile agents in hostile environments","volume":"1841","author":"kotzanikolaou","year":"2000","journal-title":"ACISP 2000"},{"key":"12","article-title":"An agent-based secure internet payment system for mobile computing","volume":"1402","author":"romao","year":"1998","journal-title":"TrEC'98"},{"key":"21","article-title":"A sanctuary for mobile agents","author":"yee","year":"1997","journal-title":"Proceedings of the DARPA Workshop on Foundations for Secure Mobile Code"},{"key":"20","article-title":"Objets \"Prote?ge?s cryptographiquement","author":"whilem","year":"1997","journal-title":"Proceedings of RenPar '97"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674837"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(99)00031-6"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1207\/S15327744JOCE1104_03"},{"key":"25","first-page":"41","article-title":"A study of building internet marketplaces on the basis of mobile agents for parallel processing","volume":"5","author":"wang","year":"2002","journal-title":"WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-005-1178-2"},{"year":"0","key":"27"},{"year":"0","key":"28"},{"journal-title":"Programming and Deploying Java Mobile Agents with Aglets","year":"1998","author":"lange","key":"29"},{"key":"3","article-title":"Agent-mediated integrative negotiation for retail electronic commerce","author":"guttman","year":"1998","journal-title":"Proceedings of Workshop on Agent Mediated Electronic Trading"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/295685.298136"},{"key":"10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-68671-1_1","article-title":"Security issues in mobile code systems","volume":"1419","author":"chess","year":"1998","journal-title":"Proceedings of Mobile Agents and Security"},{"key":"1","article-title":"Mobile agents: Are they a good idea","author":"chess","year":"1995","journal-title":"Technical Report"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.61"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-878289-76-6.ch021"},{"key":"31","doi-asserted-by":"crossref","DOI":"10.1016\/j.elerap.2004.01.003","article-title":"PumaMart: A parallel and autonomous agents based Internet marketplace","volume":"3","author":"wang","year":"2004","journal-title":"Electronic Commerce Research and Applications"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/295685.295716"},{"key":"9","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/3-540-68671-1_7","article-title":"Authentication for mobile agents","volume":"1419","author":"berkovits","year":"1998","journal-title":"Proceedings of Mobile Agents and Security"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ECMDD.1999.776415"}],"event":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","start":{"date-parts":[[2004,7,9]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2004,7,9]]}},"container-title":["Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9218\/29236\/01319740.pdf?arnumber=1319740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,21]],"date-time":"2018-12-21T05:19:29Z","timestamp":1545369569000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1319740\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icect.2004.1319740","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}